Analysis
-
max time kernel
141s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08/09/2024, 16:25
Static task
static1
Behavioral task
behavioral1
Sample
d4c7340b72e68e7f11ded929ec3a0c45_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d4c7340b72e68e7f11ded929ec3a0c45_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d4c7340b72e68e7f11ded929ec3a0c45_JaffaCakes118.exe
-
Size
580KB
-
MD5
d4c7340b72e68e7f11ded929ec3a0c45
-
SHA1
175000c4abc5e805ca735a5ea61e285c235ac3a0
-
SHA256
a86671b2813cb95454e81dd81556a64d981af3740043c0316f00f5a3da304192
-
SHA512
38d8fb3b53fe736e09d4093c83050582cb79f9adaf404339029ba0ce7a9a3ce110f0a08918aa9f4bd1d6eefd2ab7915b9d3aa7c15dd54e648a9aa160c5275eb0
-
SSDEEP
12288:BdQTonOc0uSnE4F4jpuZF3Z4mxxtvqs79z9rob9AdPf2Pc:ByupZMQmX5qqpJYE
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 3 IoCs
resource yara_rule behavioral1/memory/2564-55-0x0000000000400000-0x0000000000554000-memory.dmp modiloader_stage2 behavioral1/memory/2760-60-0x0000000000400000-0x0000000000554000-memory.dmp modiloader_stage2 behavioral1/memory/2564-72-0x0000000000400000-0x0000000000554000-memory.dmp modiloader_stage2 -
Deletes itself 1 IoCs
pid Process 1512 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2760 cmd.exe -
Loads dropped DLL 5 IoCs
pid Process 2564 d4c7340b72e68e7f11ded929ec3a0c45_JaffaCakes118.exe 2564 d4c7340b72e68e7f11ded929ec3a0c45_JaffaCakes118.exe 2960 WerFault.exe 2960 WerFault.exe 2960 WerFault.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\_cmd.exe cmd.exe File opened for modification C:\Windows\SysWOW64\_cmd.exe cmd.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2760 set thread context of 2816 2760 cmd.exe 32 -
Drops file in Program Files directory 3 IoCs
description ioc Process File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSINFO\cmd.exe d4c7340b72e68e7f11ded929ec3a0c45_JaffaCakes118.exe File created C:\Program Files\Common Files\Microsoft Shared\MSINFO\Delet.bat d4c7340b72e68e7f11ded929ec3a0c45_JaffaCakes118.exe File created C:\Program Files\Common Files\Microsoft Shared\MSINFO\cmd.exe d4c7340b72e68e7f11ded929ec3a0c45_JaffaCakes118.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2960 2760 WerFault.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d4c7340b72e68e7f11ded929ec3a0c45_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 2564 wrote to memory of 2760 2564 d4c7340b72e68e7f11ded929ec3a0c45_JaffaCakes118.exe 31 PID 2564 wrote to memory of 2760 2564 d4c7340b72e68e7f11ded929ec3a0c45_JaffaCakes118.exe 31 PID 2564 wrote to memory of 2760 2564 d4c7340b72e68e7f11ded929ec3a0c45_JaffaCakes118.exe 31 PID 2564 wrote to memory of 2760 2564 d4c7340b72e68e7f11ded929ec3a0c45_JaffaCakes118.exe 31 PID 2760 wrote to memory of 2816 2760 cmd.exe 32 PID 2760 wrote to memory of 2816 2760 cmd.exe 32 PID 2760 wrote to memory of 2816 2760 cmd.exe 32 PID 2760 wrote to memory of 2816 2760 cmd.exe 32 PID 2760 wrote to memory of 2816 2760 cmd.exe 32 PID 2760 wrote to memory of 2816 2760 cmd.exe 32 PID 2760 wrote to memory of 2960 2760 cmd.exe 33 PID 2760 wrote to memory of 2960 2760 cmd.exe 33 PID 2760 wrote to memory of 2960 2760 cmd.exe 33 PID 2760 wrote to memory of 2960 2760 cmd.exe 33 PID 2564 wrote to memory of 1512 2564 d4c7340b72e68e7f11ded929ec3a0c45_JaffaCakes118.exe 34 PID 2564 wrote to memory of 1512 2564 d4c7340b72e68e7f11ded929ec3a0c45_JaffaCakes118.exe 34 PID 2564 wrote to memory of 1512 2564 d4c7340b72e68e7f11ded929ec3a0c45_JaffaCakes118.exe 34 PID 2564 wrote to memory of 1512 2564 d4c7340b72e68e7f11ded929ec3a0c45_JaffaCakes118.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\d4c7340b72e68e7f11ded929ec3a0c45_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d4c7340b72e68e7f11ded929ec3a0c45_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2564 -
C:\Program Files\Common Files\Microsoft Shared\MSINFO\cmd.exe"C:\Program Files\Common Files\Microsoft Shared\MSINFO\cmd.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Windows\SysWOW64\calc.exe"C:\Windows\system32\calc.exe"3⤵PID:2816
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2760 -s 3003⤵
- Loads dropped DLL
- Program crash
PID:2960
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Program Files\Common Files\Microsoft Shared\MSINFO\Delet.bat""2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:1512
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
212B
MD50d64a1bf9c4570222c6c122c9000f6bc
SHA1cdced5fa715e536aaa2cd327714a9191924e6746
SHA25638ff76aacf697d653e17ac1f7e1fd754e71a8f25e2a0071e133559d4275930f2
SHA5122509388709c676e34df1c73a7e6ba59e3829f6f99fc6ee8dc409e7b77f355c55f528c484b05345e506d9becf996ce4ddb3deb02989eafeb72cd9fd56766dddeb
-
Filesize
580KB
MD5d4c7340b72e68e7f11ded929ec3a0c45
SHA1175000c4abc5e805ca735a5ea61e285c235ac3a0
SHA256a86671b2813cb95454e81dd81556a64d981af3740043c0316f00f5a3da304192
SHA51238d8fb3b53fe736e09d4093c83050582cb79f9adaf404339029ba0ce7a9a3ce110f0a08918aa9f4bd1d6eefd2ab7915b9d3aa7c15dd54e648a9aa160c5275eb0